Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2005
Rappit: framework for synthesis of host-assisted scripting engines for adaptive embedded systems
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 315–320https://doi.org/10.1145/1084834.1084912Scripting is a powerful, high-level, cross-platform, dynamic, easy way of composing software modules as black boxes. Unfortunately, the high runtime overhead has prevented scripting from being widely adopted in embedded applications. This work proposes ...
- ArticleSeptember 2005
Novel architecture for loop acceleration: a case study
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 297–302https://doi.org/10.1145/1084834.1084908In this paper, we show a novel approach to accelerate loops by tightly coupling a coprocessor to an ASIP. Latency hiding is used to exploit the parallelism available in this architecture. To illustrate the advantages of this approach, we investigate a ...
- ArticleSeptember 2005
Designing real-time H.264 decoders with dataflow architectures
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 291–296https://doi.org/10.1145/1084834.1084906High performance microprocessors are designed with general-purpose applications in mind. When it comes to embedded applications, these architectures typically perform control-intensive tasks in a System-on-Chip (SoC) design. But they are significantly ...
- ArticleSeptember 2005
Hardware/software partitioning of software binaries: a case study of H.264 decode
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 285–290https://doi.org/10.1145/1084834.1084905We describe results of a case study whose intent was to determine whether new techniques for hardware/software partitioning of an application's binary are competitive with partitioning at the C source code level. While such competitiveness has been ...
- ArticleSeptember 2005
FlexPath NP: a network processor concept with application-driven flexible processing paths
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 279–284https://doi.org/10.1145/1084834.1084904In this paper, we present a new architectural concept for network processors called FlexPath NP. The central idea behind FlexPath NP is to systematically map network processor (NP) application sub-functions onto both SW programmable processor (CPU) ...
-
- ArticleSeptember 2005
An automated exploration framework for FPGA-based soft multiprocessor systems
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 273–278https://doi.org/10.1145/1084834.1084903FPGA-based soft multiprocessors are viable system solutions for high performance applications. They provide a software abstraction to enable quick implementations on the FPGA. The multiprocessor can be customized for a target application to achieve high ...
- ArticleSeptember 2005
A multicast inter-task communication protocol for embedded multiprocessor systems
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 267–272https://doi.org/10.1145/1084834.1084901Recently, a new programming model and platform interface for MPSoC design and integration called TTL (Task Transaction Level) has been developed and advocated as a standard. In this paper, a specific implementation of the TTL interface named ITCP (Inter-...
- ArticleSeptember 2005
Service dependency graph: an efficient model for hardware/software interfaces modeling and generation for SoC design
- Adriano Sarmento,
- Lobna Kriaa,
- Arnaud Grasset,
- Mohamed-Wassim Youssef,
- Aimen Bouchhima,
- Frederic Rousseau,
- Wander Cesario,
- Ahmed Amine Jerraya
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 261–266https://doi.org/10.1145/1084834.1084900Complex systems-on-chip are designed by interconnecting pre-designed hardware (HW) and software (SW) components. During the design cycle, a global model of the SoC may be composed of HW and SW models at different abstraction levels. Designing HW/SW ...
- ArticleSeptember 2005
Retargetable generation of TLM bus interfaces for MP-SoC platforms
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 249–254https://doi.org/10.1145/1084834.1084898In order to meet flexibility, performance and energy efficiency constraints, future SoC (System-on-Chip) designs will contain an increasing number of heterogeneous processor cores combined with a complex communication architecture. Optimal platforms are ...
- ArticleSeptember 2005
Memory access optimizations in instruction-set simulators
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 237–242https://doi.org/10.1145/1084834.1084895Design of programmable processors and embedded applications requires instruction-set simulators for early exploration and validation of candidate architectures. Interpretive simulators are widely used in embedded systems design. One of the key ...
- ArticleSeptember 2005
Efficient performance analysis of asynchronous systems based on periodicity
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 225–230https://doi.org/10.1145/1084834.1084892This paper presents an efficient method for the performance analysis and optimization of asynchronous systems. An asynchronous system is modeled as a marked graph with probabilistic delay distributions. We show that these systems exhibit inherent ...
- ArticleSeptember 2005
Power-smart system-on-chip architecture for embedded cryptosystems
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 184–189https://doi.org/10.1145/1084834.1084883In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provides support for masking these channels by controlling, in real-time, the ...
- ArticleSeptember 2005
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 178–183https://doi.org/10.1145/1084834.1084882We propose a secure platform on a chip multiprocessor, known as FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its most important feature is the higher security based on multi-grained ...
- ArticleSeptember 2005
An integer linear programming approach for identifying instruction-set extensions
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 172–177https://doi.org/10.1145/1084834.1084880This paper presents an Integer Linear Programming (ILP) approach to the instruction-set extension identification problem. An algorithm that iteratively generates and solves a set of ILP problems in order to generate a set of templates is proposed. A ...
- ArticleSeptember 2005
Satisfying real-time constraints with custom instructions
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 166–171https://doi.org/10.1145/1084834.1084879Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application of instruction-set extensions to meet timing constraints in real-time ...
- ArticleSeptember 2005
Enhanced code density of embedded CISC processors with echo technology
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 160–165https://doi.org/10.1145/1084834.1084878Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even at the cost of significant performance loss. In this paper, we develop an ...
- ArticleSeptember 2005
Aggregating processor free time for energy reduction
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 154–159https://doi.org/10.1145/1084834.1084876Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the processor stalls, waiting for data from the memory. Processor stall can be ...
- ArticleSeptember 2005
Energy conscious online architecture adaptation for varying latency constraints in sensor network applications
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 148–153https://doi.org/10.1145/1084834.1084875Sensor network applications face continuously changing environments, which impose varying processing loads on the sensor node. This paper presents an online control method which adapts the architecture to minimize energy consumption while satisfying ...
- ArticleSeptember 2005
An architectural level design methodology for embedded face detection
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 136–141https://doi.org/10.1145/1084834.1084872Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, including banking and security system access control, video surveillance, and ...
- ArticleSeptember 2005
Microcoded coprocessor for embedded secure biometric authentication systems
CODES+ISSS '05: Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesisPages 130–135https://doi.org/10.1145/1084834.1084871We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by means of a fuzzy vault scheme. The algorithm is implemented in a ...